0% found this document useful (0 votes)
114 views101 pages

Unit 3

This document provides an overview of IEEE 802.11 wireless LAN standards and technologies. It discusses the introduction to 802.11b/g/n wireless technologies, Bluetooth, and WML programming. It also summarizes key components of 802.11 wireless networks including stations, access points, the wireless medium, and distribution systems. Finally, it compares bus, star, and ring network topologies and how data is transmitted in each.

Uploaded by

ashwani tyagi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views101 pages

Unit 3

This document provides an overview of IEEE 802.11 wireless LAN standards and technologies. It discusses the introduction to 802.11b/g/n wireless technologies, Bluetooth, and WML programming. It also summarizes key components of 802.11 wireless networks including stations, access points, the wireless medium, and distribution systems. Finally, it compares bus, star, and ring network topologies and how data is transmitted in each.

Uploaded by

ashwani tyagi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 101

Mobile Computing

CSE 062

Unit 3
Syllabus

Unit 3 WIRELESS LANS

A Introduction to IEEE 802.11b/g/n

B Bluetooth technologies and architecture.

C HIPERLAN, WML programming


Wireless Market Segments & Partners
Wireless Internetworking
Overview

Residential/ Fixed Mobile


Premise/ Campus
Broadband Multiservice
2G+ 3G
IEEE BLUE Cellular Cellular
802.11 TOOTH

MMDS Data Packet


LMDS
Services Data/Voice
Cisco/
Bosch GPRS UMTS
Mobile IP
IEEE 802.11
 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and
specifies the set of media access control (MAC) and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) computer communication.

 The standard and amendments provide the basis for wireless network products using the Wi-Fi brand
and are the world's most widely used wireless computer networking standards.

 IEEE 802.11 is used in most home and office networks to allow laptops, printers, smartphones, and
other devices to communicate with each other and access the Internet without connecting wires.

 The standards are created and maintained by the Institute of Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).

 The base version of the standard was released in 1997 and has had subsequent amendments.
Wireless?

 A wireless LAN or WLAN is a wireless local area network that uses radio
waves as its carrier.

 The last link with the users is wireless, to give a network connection to all
users in a building or campus.

 The backbone network usually uses cables


The wireless LAN connects to a wired LAN
 Wireless Access Points (APs) - A small device that bridges wireless traffic to your network.

 There is a need of an access point that bridges wireless LAN traffic into the wired LAN.

 The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the
maximum possible distance between nodes.

 Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are
available as well.
How are WLANs Different?

 They use specialized physical and data link protocols

 They integrate into existing networks through access points which provide a bridging function

 They let you stay connected as you roam from one coverage area to another

 They have unique security considerations

 They have specific interoperability requirements

 They require different hardware

 They offer performance that differs from wired LANs.


IEEE 802.11 Overview

 Adopted in 1997.

Defines;
Goals
 MAC sublayer •To deliver services in wired networks

 MAC management protocols and services •To achieve high throughput


•To achieve highly reliable data delivery
 Physical (PHY) layers
•To achieve continuous network connection.
 IR

 FHSS

 DSSS
 Wireless networks are standardized by IEEE.

 Under 802 LAN MAN standards committee.

Application
Presentation
ISO
OSI Session IEEE 802
7-layer Transport standards
model Network Logical Link Control
Data Link Medium Access (MAC)

Physical Physical (PHY)


Physical Layer:

 The wireless NIC takes frames of data from the link layer, scrambles the data
in a predetermined way, then uses the modified data stream to modulate a radio
carrier signal.

Data Link Layer:

 Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA).


Components

 Station

 BSS - Basic Service Set

o IBSS : Infrastructure BSS : QBSS

 ESS - Extended Service Set

o A set of infrastrucute BSSs.

o Connection of APs

o Tracking of mobility

 DS – Distribution System

o AP communicates with another


 Station services:

o authentication,

o de-authentication,

o privacy,

o delivery of data

 Distribution Services ( A thin layer between MAC and LLC sublayer)

o association

o disassociation
A station maintain two variables:
o reassociation • authentication state (=> 1)

o distribution • association state (<= 1)

o Integration
The IEEE 802.11 and supporting LAN Standards

IEEE 802.2
Logical Link Control (LLC) OSI Layer 2
(data link)
.
MAC
IEEE 802.3 IEEE 802.4 IEEE 802.5
IEEE 802.11
Carrier Token Token Wireless
Sense Bus Ring OSI Layer 1
PHY
(physical)
a b g

bus star ring


How ring-network works

 A node functions as a repeater


A A
 Only destination copies
C A B C A B
frame to it, all other nodes
have to discard the frame
B transmits frame C ignores frame
addressed to A
 Unidirectional link
A A

A
C B C A B

A copies frame C absorbs


returning frame
Token ring

 A ring consists of a single or dual (FDDI) cable in the shape of a loop

 Each station is only connected to each of its two nearest neighbors. Data in the form of packets pass around
the ring from one station to another in uni-directional way.

 Advantages :

(1) Access method supports heavy load without degradation of performance because the medium is not
shared.

(2) Several packets can simultaneously circulate between different pairs of stations.

 Disadvantages:

(1) Complex management

(2) Re-initialization of the ring whenever a failure occurs


How bus-network works

 In a bus network, one node’s transmission traverses the entire network and is received and examined by every node.

(1) Contention scheme : multiple nodes attempt to access bus; only one succeed at a time (e.g. CSMA/CD in Ethernet)

(2) Round robin scheme : a token is passed between nodes; node holds the token can use the bus (e.g.Token bus)

 Advantages:

(1) Simple access method

(2) Easy to add or remove stations


A B C D
 Disadvantages:
D
term term
(1) Poor efficiency with high network load

(2) Relatively insecure, due to the shared medium


802.11 LAN architecture

 wireless host communicates with base


Internet
station

 base station = access point (AP)

 Basic Service Set (BSS) (aka “cell”) in


hub, switch
or router infrastructure mode contains:
AP
 wireless hosts
BSS
1 AP  access point (AP): base station

 ad hoc mode: hosts only

BSS 2
IEEE 802.11 networks consist of four major components

 Stations Stations are computing devices with wireless network interfaces. Typically, stations are
battery-operated laptop or handheld pocket PCs.

 Access points Frames on an 802.11 network must be converted to another type of frame for
delivery to a wired network. Devices called access points (AP) perform the wireless to-wired
bridging function.

 Wireless medium: To move frames from station to station, the standard uses a wireless medium.

 Distribution system: When several APs are connected to form a large coverage area, they must
communicate with each other to handle the movements of mobile stations. The distribution system
(DS) is the logical component of 802.11 used to forward frames to their destination.
Basic service sets (BSSs)
 The BSS is the basic building block of a wireless LAN. A BSS consists of stationary or mobile
wireless stations and possibly a central base station (e.g., an AP).

 When a station is in the BSS, it can communicate with the other members of the BSS.

 The BSS without an AP is a stand-alone network and cannot send data to other BSSs. Such BSSs are
called Independent BSSs (IBSS).

 Typically, IBSSs involve a small number of stations set up for a specific purpose and for a short
period of time (e.g., creating a short-lived network to support a single meeting in a conference room).
IBSSs are also referred to as ad hoc networks

 An infrastructure BSS is bounded by the coverage distance from the AP. The coverage area of a single
AP is called a cell. All mobile stations are required to be within reach of the AP.
Extended service sets (ESSs)
 802.11 allows wireless networks of arbitrarily large size to be created by linking BSSs into an ESS.

 An ESS is created by chaining BSSs together with a backbone network.

 All the APs in an ESS are given the same Service Set Identifier (SSID), which serves as a network
name for its users.

 APs in an ESS operate in a manner such that the outside world can use the station’s MAC address to
talk to a station without worrying about its location in the ESS.
Medium Access Control

Functionality:

o Reliable data delivery

o Fairly control access

o Protection of data

Deals:

o Noisy and unreliable medium

o Frame exchange protocol - ACK

o Participation of all stations

o Reaction to every frame


IEEE 802.11 MAC Protocol: CSMA/CA

802.11 sender
1 if sense channel idle for DIFS (DCF Inter-Frame Space)
sender receiver
then
transmit entire frame (no CD) DIFS

2 if sense channel busy then


start random backoff time data
timer counts down while channel idle
transmit when timer expires SIFS

if no ACK, increase random backoff interval, repeat 2


ACK
802.11 receiver
- if frame received OK
return ACK
Note: Distributed Coordination Function (DCF) maximizes throughput while preventing packet collisions
Avoiding collisions (more)

Idea: Allow sender to “reserve” channel rather than random access of data frames: Avoid collisions of
long data frames

 Sender first transmits small request-to-send (RTS) packets to BS using CSMA

o RTSs may still collide with each other (but they’re short)

 BS broadcasts clear-to-send CTS in response to RTS

 CTS heard by all nodes

o sender transmits data frame

o other stations defer transmissions

avoid data frame collisions completely


using small reservation packets!
Collision Avoidance: RTS-CTS exchange

A B
AP

reservation
collision

DATA (A)
defer

time
802.11 frame: addressing

2 2 6 6 6 2 6 0 - 2312 4
frame address address address seq address
duration payload CRC
control 1 2 3 control 4

Address 4: used only in


Address 1: MAC address ad hoc mode
of wireless host or AP Address 3: MAC address
to receive this frame of router interface to which
AP is attached
Address 2: MAC address
of wireless host or AP
transmitting this frame
 Frame control: The frame control is 2 bytes long and defines the type of the frame and
control information.

 Protocol version: Indicates which version of 802.11 MAC is contained in the rest of the
frame.

 Type: Defines the type of information carried in the frame body: management (00), control
(01), or data (10).

 Subtype: Defines the subtype of each management, control, or data frame.

 ToDS: This bit is set to 1 if the frame was sent to the DS.

 FromDS: This bit is set to 1 if the frame was sent from the DS.
 More fragments: When a higher-level packet has been fragmented by the MAC, after the
initial fragment if there exists any other fragments, set this bit to 1.

 Retry: The retry bit is set to 1 if the current packet is a retransmission of a previous attempt.
This aids the receiving station in eliminating duplicate packets.

 Power management: To conserve battery life, many small devices have the ability to power
down parts of the network interface. A 1 indicates that the station will be in powersave mode,
and 0 indicates that the station will be active.

 More data: To accommodate stations in a power saving mode, APs may buffer frames
received from the DS.
 WEP: Wireless transmissions are inherently easier to intercept than transmissions on a wired
network. The Wired Equivalent Privacy (WEP) bit is set to 1 if the payload of the packet has
been encrypted using the WEP algorithm.

 Order: Frames and fragments can be transmitted in any order by both the receiving and
sending stations. The bit is set to 1 when the packets must be strictly ordered, for example, for
VoIP.

 Sequence control: The sequence control field is composed of a 4-bit fragment number and a
12-bit sequence number. This field is used for defragmentation and discarding duplicate
frames.
 Frame body: The frame body moves the higher-layer payload from station to station. 802.11
can transmit frames with a maximum payload of 2304 bytes of data.

 Frame check sequence: Similar to Ethernet, the 802.11 frame ends with a Frame Check
Sequence (FCS), also known as Cyclic Redundancy Check (CRC). The FCS allows stations
to check the integrity of received frames.
802.11a (OFDM waveform)

 802.11a, published in 1999, uses the same data link layer protocol and frame format as the original
standard, but an OFDM based air interface (physical layer) was added. It was later relabeled Wi-Fi 1, by
the Wi-Fi Alliance, relative to Wi-Fi 2 (802.11b).

 It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code,
which yields realistic net achievable throughput in the mid-20 Mbit/s.

 Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively unused
5 GHz band gives 802.11a a significant advantage.
 However, this high carrier frequency also brings a disadvantage: the effective overall range of
802.11a is less than that of 802.11b/g.

 In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due
to their smaller wavelength, and, as a result, cannot penetrate as far as those of 802.11b.
802.11b

 The 802.11b standard has a maximum raw data rate of 11 Mbit/s (Megabits per second) and uses the
same media access method defined in the original standard.

 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the
modulation technique defined in the original standard.

 The dramatic increase in throughput of 802.11b (compared to the original standard) along with
simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive
wireless LAN technology.
 Devices using 802.11b experience interference from other products operating in the 2.4 GHz band.

 Devices operating in the 2.4 GHz range include microwave ovens, Bluetooth devices, baby monitors,
cordless telephones, and some amateur radio equipment.

 As unlicensed intentional radiators in this ISM band, they must not interfere with and must tolerate
interference from primary or secondary allocations (users) of this band, such as amateur radio.
802.11g

 In June 2003, a third modulation standard was ratified: 802.11g.

 This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme
as 802.11a.

 It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction
codes, or about 22 Mbit/s average throughput.

 The then-proposed 802.11g standard was rapidly adopted in the market starting in January 2003, well
before ratification, due to the desire for higher data rates as well as reductions in manufacturing costs.

 Like 802.11b, 802.11g devices also suffer interference from other products operating in the 2.4 GHz
band, for example, wireless keyboards.
802.11n

 802.11n is an amendment that improves upon the previous 802.11 standards; its first draft of
certification was published in 2006.

 The 802.11n standard was retroactively labelled as Wi-Fi 4 by the Wi-Fi Alliance.

 The standard added support for multiple-input multiple-output antennas (MIMO).

 802.11n operates on both the 2.4 GHz and the 5 GHz bands. Support for 5 GHz bands is optional.

 Its net data rate ranges from 54 Mbit/s to 600 Mbit/s.


802.11ac

 IEEE 802.11ac-2013 is an amendment to IEEE 802.11, published in December 2013, that builds on
802.11n.

 The 802.11ac standard was retroactively labelled as Wi-Fi 5 by Wi-Fi Alliance.

 Changes compared to 802.11n include wider channels (80 or 160 MHz versus 40 MHz) in the 5 GHz
band, more spatial streams (up to eight versus four), higher-order modulation (up to 256-QAM vs.
64-QAM), and the addition of Multi-user MIMO (MU-MIMO).
802.11ax

 IEEE 802.11ax is the successor to 802.11ac.

 It's marketed as Wi-Fi 6 (2.4 GHz and 5 GHz) and Wi-Fi 6E (6 GHz) by the Wi-Fi Alliance.

 It is also known as High Efficiency Wi-Fi, for the overall improvements to Wi-Fi 6 clients
under dense environments.

 For an individual client, the maximum improvement in data rate against the predecessor (802.11ac) is
only 39%.
 Yet, even with this comparatively minor 39% figure, the goal was to provide 4 times the throughput-
per-area of 802.11ac (hence High Efficiency).

 The motivation behind this goal was the deployment of WLAN in dense environments such as
corporate offices, shopping malls and dense residential apartments.

 This is achieved by means of a technique called OFDMA, which is basically multiplexing in


the frequency domain.

 The IEEE 802.11ax-2021 standard was approved on February 9, 2021


Security in IEEE 802.11

 In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping
sequences or direct sequence codes used.

 The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a
wireless LAN offer privacy equivalent to that offered by a wired LAN.

 The standard also specifies optional authentication measures.


 Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission
between clients and access points.

 Services:

o Authentication: provides access control to the network by denying access to client stations that
fail to authenticate properly.

o Confidentiality: intends to prevent information compromise from casual eavesdropping

o Integrity: prevents messages from being modified while in transit between the wireless client and
the access point.
Authentication and privacy
 Goal: to prevent unauthorized access & eavesdropping

 Open system authentication: Station wanting to authenticate sends authentication management


frame - receiving station sends back frame for successful authentication

 Shared key authentication (included in WEP*)

o Secret, shared key received by all stations by a separate, 802.11 independent channel

o Stations authenticate by a shared knowledge of the key properties

 WEP’s privacy (blocking out eavesdropping) is based on ciphering:

*WEP: Wired Equivalent Privacy


Privacy

 Cryptographic techniques

 WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The
stream is XORed with the data to be transmitted

 Key sizes: 40bits to 128bits

 Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack
regardless of key size
Security Problems
 Security features in Wireless products are frequently not enabled.

 Use of static WEP keys (keys are in use for a very long time). WEP does not provide key
management.

 Cryptographic keys are short.

 No user authentication occurs – only devices are authenticated. A stolen device can access the
network.

 Identity based systems are vulnerable.

 Packet integrity is poor.


WLAN benefits

 Mobility

o increases working efficiency and productivity

o extends the On-line period

 Installation on difficult-to-wire areas

o inside buildings

o road crossings

 Increased reliability

 Reduced installation time


 Broadband

o 11 Mbps for 802.11b

o 54 Mbps for 802.11a/g (GSM:9.6Kbps, HCSCD:~40Kbps, GPRS:~160Kbps, WCDMA:up to


2Mbps)

 Long-term cost savings

o O & M cheaper than that for wired nets

o Comes from easy maintenance, cabling cost, working efficiency and accuracy

o Network can be established in a new location just by moving the PCs!


WLAN technology problems

 Date Speed: IEEE 802.11b support up to 11 MBps, sometimes this is not enough - far lower than 100
Mbps fast Ethernet

 Interference: Works in ISM band, share same frequency with microwave oven, Bluetooth, and others

 Security: Current WEP algorithm is weak - usually not ON!

 Roaming: No industry standard is available and propriety solution are not interoperable - especially
with GSM

 Inter-operability: Only few basic functionality are interoperable, other vendor’s features can’t be
used in a mixed network
WLAN implementation problems

 Lack of wireless networking experience for most IT engineer


 No well-recognized operation process on network implementation
 Selecting access points with ‘Best Guess’ method
 Unaware of interference from/to other networks
 Weak security policy
 As a result, your WLAN may have
o Poor performance (coverage, throughput, capacity, security)
o Unstable service
o Customer dissatisfaction
Other WLAN technologies
 High performance LAN or HiperLAN (ETSI-BRAN EN 300 652) in the 5 GHz ISM (HiperLAN
provides QoS for data, video, voice and images)

o version 1 up to 24 Mbps

o version 2 up to 54 Mbps

 Bluetooth

o range up to 100 meters only (cable replacement tech.)

o Operates at max of 740 kbps at 2.4 GHz ISM band

o Applies fast frequency hopping 1600 hops/second

o Can have serious interference with 802.11 2.4 GHz range network
Bluetooth Technology
 Bluetooth technology is a high speed and low powered wireless technology designed to
connect phones or other portable equipment for communication or file transmissions.

 This is based on mobile computing technology.

 Bluetooth is also known as IEEE 802.15 standard or specification that uses low power radio
communications to link phones, computers and other network devices over a short distance
without using any type of connecting wires.
 As Bluetooth is an open wireless technology standard so, it is used to send or receive data to
connected devices present across a certain distance using a band of 2.4 to 2.485 GHz.

 In Bluetooth technology, the wireless signals transmit data and files over a short distance,
typically up to 30 feet or 10 meters.

 Bluetooth technology was developed by a group of 5 companies known as Special Interest


Group (SIG) formed in 1998. The companies are Ericsson, Intel, Nokia, IBM, and Toshiba.
 The range of Bluetooth technology for data exchange was up to 10 meters in older versions of
devices, but the latest version of Bluetooth technology i.e., Bluetooth 5.0, can exchange data
in the range of about 40-400 meters.

 The average speed of data transmission in Bluetooth technology was around 1 Mbps in the
very first version.

 The second version was 2.0+ EDR, which provided the data rate speed of 3Mbps.

 The third was 3.0+HS, which provided the speed of 24 Mbps.

 The latest version of this technology is 5.0.


History

 1998 - Bluetooth technology is officially introduced

 1999 - Bluetooth 1.0 Specification is introduced.

 2003 - The BLUETOOTH SIG overhauls the Bluetooth Core Specification with the announcement
of Version 2.1.

 2004 - Bluetooth Version 2.0 + EDR (Enhanced Data Rate) is introduced.

 2005 - Devices using Version 2.0 + EDR begin to hit the market in late 2005.

 2007 - Bluetooth Core Specification Version 2.1 + EDR is adopted by the BLUETOOTH SIG.

 2009 - Bluetooth Core Specification Version 3.0 + HS (High Speed) is adopted by the
BLUETOOTH SIG.
The usage of Bluetooth has widely increased for its special features

 Bluetooth offers a uniform structure for a wide range of devices to connect and communicate with
each other.

 Bluetooth technology has achieved global acceptance such that any Bluetooth enabled device, almost
everywhere in the world, can be connected with Bluetooth enabled devices.

 Low power consumption of Bluetooth technology

 Bluetooth offers interactive conference by establishing an adhoc network of laptops.

 Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile phones.
Architecture of Bluetooth Technology

 Bluetooth enabled electronic devices connect and communicate wirelessly through shortrange
devices known as Piconets.

 Bluetooth devices exist in small ad-hoc configurations with the ability to act either as master or slave
the specification allows a mechanism for master and slave to switch their roles.

 Point to point configuration with one master and one slave is the simplest configuration.

 When more than two Bluetooth devices communicate with one another, this is called a PICONET. A
Piconet can contain up to seven slaves clustered around a single master. The device that initializes
establishment of the Piconet becomes the master.
 The master is responsible for transmission control by dividing the network into a series of
time slots amongst the network members, as a part of time division multiplexing scheme

 The master node is responsible for sending the data while the slave nodes are used to receive
the data.

 In Bluetooth technology, data transmission occurs through Ultra-High frequency and short-
wavelength radio waves.

 The Piconet uses the concept of multiplexing and spread spectrum. It is a combination of code
division multiple access (CDMA) and frequency hopping spread spectrum (FHSS) technique.
 Within a Piconet, the timing of various devices and the frequency hopping sequence of
individual devices is determined by the clock and unique 48-bit address of master.

 Each device can communicate simultaneously with up to seven other devices within a single
Piconet.

 Each device can communicate with several piconets simultaneously.

 Piconets are established dynamically and automatically as Bluetooth enabled devices enter
and leave piconets.
 There is no direct connection between the slaves and all the connections are essentially
master-to-slave or slave-to-master.

 Slaves are allowed to transmit once these have been polled by the master.

 Transmission starts in the slave-to-master time slot immediately following a polling packet
from the master.
 It can be a slave in one piconet and master in another. It however cannot be a master in more
than once piconet.

 Devices resident in adjacent piconets provide a bridge to support inner-piconet connections,


allowing assemblies of linked piconets to form a physically extensible communication
infrastructure known as Scatternet.
How does Bluetooth work?
 As we stated that there is one master and several slaves may exist for a Bluetooth connection.

 The master is the device that initiates communication with other devices.

 The master device handles the communications link and traffic between itself and the slave
devices associated with it.

 The slave devices have to respond to the master device and synchronize their transmit/receive
timing with the master device's specified time.
Advantages of Bluetooth Technology

 Cheap because it doesn't need any transmission wire that reduces the cost.

 It is very simple to form a Piconet in Bluetooth technology.

 It removes the problem of radio interference by using the Speed Frequency Hopping technique.

 The energy or power consumption is very low, about 0.3mW. It makes it possible for the least utilization
of battery life.

 It is robust because it guarantees security at a bit level. The authentication is controlled using a 128bit key.

 Can be used for transferring the data, and verbal communication as Bluetooth can support data channels
of up to 3 similar voice channels.

 Doesn't require line of sight and one to one communication as used in other modes such as infrared.
Disadvantages of Bluetooth Technology

 In Bluetooth technology, the bandwidth is low.

 The data transmission range may also be an issue because it is also less.
Security Modes in Bluetooth

 Non-Secure

 Service-level enforced security

 Link-Level Enforced Security


Security Mechanisms

 Encryption keys protect data in session

 Link-layer keys provide authentication

 Link layer security

o 48-bit device address, fixed & unique

o 128-bit pseudorandom private key for authentication

o 8 to 128 bit private key for encryption

o 128 bit pseudorandom number generated by the device


4 basic keys

 Initialization Key

Used during installation, requires PIN

 Unit Key

After device is installed, stored in non-volatile memory

 Combination Key

Between every pair of devices communicating with each other

 Master Key

When master wants to transmit to multiple devices at once


Initialization Key

 Uses E22 Algorithm

 Discarded after key exchange

 Key: Combination of

o PIN Code(8-128) bits

o Bluetooth device address(48 bits)

o Random 128 bit number


Unit Key

 Associated with device

 Generated by E21 Algorithm

 Uses:

o Bluetooth device address

o Random number(128 bits)


Combination Key

 Both devices A & B compute a number LK_KA & LK_KB resp.

 Computed using E21 Algorithm

o Random number

o Bluetooth device address

 Devices exchange random numbers they used by XORing number with current initialization key

 Then, device extract random number by XORing it with initialization key

 Now devices know each others Bluetooth device address so A now generates LK_K B & B generates
LK_KA
Master Key

 Temporary key

 Master device generates it with 2 random 128-bit numbers

 Random number is sent to the slaves, which use it & initialization key to generate overlay

 Master key is XORed with overlay by the master & sent to the slaves, which extract master key

 Done for each slave


Bluetooth Encryption

Three modes

o First Mode: nothing is encrypted

o Second Mode: Broadcast traffic is not encrypted

o Third Mode: all traffic is encrypted


HIPERLAN
(High-Performance Radio Local Area Network)

 A high-performance local area network (HIPERLAN) is an alternative wireless LAN standard to the
IEEE 802.11.

 It is one of four standards (HIPERLAN 1 through 4) specified by the European telecommunications


standards institute (ETSI) to link interoperable technologies from different locations instead of cable.

 The main idea behind HIPERLAN is to provide an infrastructure or ad-hoc wireless system with a
small radius.
 HIPERLAN emerged in 1991 with the goal of achieving higher data rates than the 802.11 standard.

 It was approved in 1996.

 A second version was introduced in 2000. This version is designed as a fast wireless connection and
can be used with various networks, such as UMTS backbone, ATM, and IP networks.

 HiperLAN/2 can also be used as a home network and supports a data rate of up to 54 Mbps.

 HIPERLAN is designed to work without any infrastructure. Two stations may exchange data directly,
without any interaction from a wired (or radio-based) infrastructure. The simplest HIPERLAN thus
consists of two stations.

 Further, if two HIPERLAN stations are not in radio contact with each other, they may use a third
station (i.e. the third station must relay messages between the two communicating stations).
 HIPERLAN is a European (ETSI) standardization initiative for a HIgh PERformance wireless Local
Area Network.

 Radio waves are used instead of a cable as a transmission medium to connect stations.

 The max. data rate for the user depends on the distance of the communicating stations. With short
distances (<50 m) and asynchronous transmission a data rate of 20 Mbit/s is achieved, with up to 800
m distance a data rate of 1 Mbit/s are provided.

 For connection-oriented services, e.g. video-telephony, at least 64 kbit/s are offered.


 It supports a packet-oriented structure, which can be used for networks with or without a central
control (BS-MS and ad-hoc).

 HiperLAN/1 is specifically designed to support adhoc computing for multimedia systems, where
there is no requirement to deploy a centralized infrastructure.

 The HiperLAN/1 MAC is compatible with the standard MAC service interface, enabling support for
existing applications.

 HiperLAN 2 has been specifically developed to have a wired infrastructure, providing short-range
wireless access to wired networks such as IP and ATM.
 One of the primary features of HiperLAN/2 is its high speed transmission rates (up to 54 Mbps).

 It uses a modulation method called OFDM to transmit analog signals.


 The HiperLAN/2 architecture shown in the figure allows for interoperation with virtually any type
of fixed network, making the technology both network and application independent.

 HiperLAN/2 networks can be deployed at "hot spot" areas such as airports and hotels, as an easy
way of offering remote access and internet services.
 The two main differences between HiperLAN types 1 and 2 are as follows:

• Type 1 has a distributed MAC with QoS provisions, whereas type 2 has a centralized schedule MAC.

• Type 1 is based on Gaussian minimum shift keying (GMSK), whereas type 2 is based on OFDM.

• HiperLAN/2 automatically performs handoff to the nearest access point. The access point is
basically a radio BS that covers an area of about 30 to 150 meters, depending on the environment.
 Components of a HIPERLAN include:

• Physical Layer: This layer provides the standard functions, including radio frequency
functions.

• Link Adaptation: This standard allows the access point to convey information in an uplink or
downlink direction.

• Data Link Control (DLC) Layer: This layer includes the Media Access Control (MAC), Radio
Link Control (RLC), Dynamic Frequency Selection (DFS) and Error Control (EC) protocols.

• Convergence Layer: Its basic function is to provide the HIPERLAN DLC and physical access
to other data networks.
 The goals of HiperLAN are as follows:

• QoS (to build multiservice network)

• Strong security

• Handoff when moving between local area and wide areas

• Increased throughput

• Ease of use, deployment, and maintenance

• Affordability

• Scalability
 HIPERLAN requirements:
•Short range - 50m
•Low mobility - 1.4m/s
•Networks with and without infrastructure
•Support isochronous traffic
•audio 32kbps, 10ns latency
•video 2Mbps, 100ns latency
•Support asynchronous traffic
•data 10Mbps, immediate access
 Communication Service and Infrastructural Aspects

• HIPERLAN does not support handover

• HIPERLAN requires a gateway to a fixed (backbone) infrastructure

• Not necessarily requires base stations: Hiperlan also supports peer-to-peer

• Radio modem fits in PCMCIA slot of PC

• Supports time-bounded services (priority scheme)


The future of HIPERLAN:
WML
(Wireless Markup Language)

 WML stands for Wireless Markup Language (WML) which is based on HTML and HDML.

 It is specified as an XML document type.

 It is a markup language used to develop websites for mobile phones.

 While designing with WML, constraints of wireless devices such as small display screens, limited
memory, low bandwidth of transmission and small resources have to be considered.

 WAP (Wireless Application Protocol) sites are different from normal HTML sites in the fact that they are
monochromatic (only black and white), concise and has very small screen space. Therefore, the content
in the WAP sites will be only the significant matter, much like how telegraph used to work.
 The concept WML follows is that of a deck and card metaphor.

 A WML document is thought of as made up of many cards.

 Just like how cards can be grouped to form a deck, a WAP site has many cards.

 One card will be displayed at a time on the screen, just like how one page is displayed at a time in an
HTML website.

 Many cards can be inserted into a WML document, and the WML deck is identified by a URL.

 To access the deck, the user can navigate using the WML browser, which fetches the deck as
required.
 Features of WML:

• Text and Images: WML gives a clue about how the text and images can be presented to the user.
The final presentation depends upon the user. Pictures need to be in WBMP format and will be
monochrome.

• User Interaction: WML supports different elements for input like password entry, option selector
and text entry control. The user is free to choose inputs such as keys or voice.

• Navigation: WML offers hyperlink navigation and browsing history.

• Context Management: The state can be shared across different decks and can also be saved
between different decks.
 Problems Faced by a Web Application When Used With a Mobile and Wireless Environment:

 1. HTTP:

• Bandwidth and delay: HTTP is not made for low bandwidth and high delay connections in mind.
HTTP protocol headers are large and redundant as HTTP is uncompressed and stateless.

• Caching: Caching is disabled by content providers as client companies cannot get feedback if a
cache is placed between a server and a client. Users suffer from downloading the same content
repeatedly from the server as HTTP is stateless.

• Posting: Sending some content from a client to a server will create additional problems if the said
client is disconnected at that moment.
 2. HTML: HTML was designed for use in creating content for webpages of the World Wide Web
(www). It was meant only for desktop initially. Thus, when used in hand-held devices, some
problems arise:

• Small display and low-resolution.

• Limited User Interfaces.

• Low-Performance CPU.
Enhancements needed for use of HTML in wireless environments:

 Image scaling

 Content Transformation: Documents in PDF or PPS should be transformed into the plain text as PDF
occupies more memory.

 Content Extraction: To avoid longer duration waits, some content like headlines can be extracted from
the document and presented to the user. This lets the user decide which information alone needs to be
downloaded.
Enhancements needed for use of HTTP in wireless environments:

 Connection Re-use: Client and server can use the same TCP (Transmission Control Protocol)
connection for several requests and responses. Pipelining can be used to improve performance.

 Caching Enhancements: A cache could store cacheable response to reduce response time and
bandwidth for further responses. Caching can be done in the mobile client’s web browser itself by
using a client proxy. A network proxy can also be used on the network side.

 Bandwidth Optimization: HTTP supports compression and also negotiates the compression
parameters and compression styles. This will allow partial transmissions.
Comparison of WML with HTML:

 WML is used only for WAP sites on mobile phones and can be hosted only be WAP hosts that support WML.
HTML can be hosted by any web server.

 WML sites are monochrome, unlike HTML sites.

 Coding is similar in many aspects but a badly coded WAP site will definitely not run as compared to a badly
coded HTML site.

 It is must to close all WML tags as compared to the more lenient HTML coding.

 There are no alignment tags like the <center> tag in WML, as in HTML. Instead, <p align=”center”> has to be
used for aligning text in WML.

 There are problems when using old HTML tags like <br> which have no closing tag. To get around this in
WML, some tags have a “/” put on the end like <br />.

 Only WBMP format monochrome images are supported in WML whereas there is no such restriction in HTML.
Thank You

You might also like